Mahalanobis distance and pauta criterion based log anomaly detection algorithm for 5G mobile network

Y Zheng, Y Li, Y Jin, X Zhu, L Xu, T Xiao… - … Conference on Trust …, 2022 - ieeexplore.ieee.org
In the 5G era, mobile networks gradually become complex, and there are also high
requirements for network operation and maintenance. As log data is important information to …

Deep Learning-Based Log Anomaly Detection for 5G Core Network

Y Tan, J Wang, J Liu, Y Li - 2023 IEEE/CIC International …, 2023 - ieeexplore.ieee.org
Adopting network function virtualization in 5G core network (CN) enables flexible and agile
service development, but it also brings increased complexity and the likelihood of …

System Log Anomaly Detection Based on Spiking Neural Network Trained with Backpropagation

J Zheng, Z Wang - 2023 3rd International Conference on …, 2023 - ieeexplore.ieee.org
System log analysis is one of the most important ways to defend attacks and avoid system
exceptions. However, rule-based log anomaly detection cannot meet the requirements of …

FastTransLog: A Log-based Anomaly Detection Method based on Fastformer

Y Wang, X Li - … Conference on Dependable Systems and Their …, 2022 - ieeexplore.ieee.org
In daily operation, the log, as one of the most important information to record the status of the
system, is a part of the content we need to pay attention to. Therefore, there are a lot of …

Log anomaly detection method based on hybrid transformer-bilstm models

X Ou, J Liu - 2022 IEEE 22nd International Conference on …, 2022 - ieeexplore.ieee.org
Log analysis is quite significant for reliability issues in large cloud data centers. There are
noticeable problems in log anomaly detection, such as single feature extraction …

LogKT: Hybrid Log Anomaly Detection Method for Cloud Data Center

X Ou, J Liu - 2023 IEEE 47th Annual Computers, Software, and …, 2023 - ieeexplore.ieee.org
Log anomaly detection is a fairly indispensable log analysis task for reliability and
maintainability in cloud data center. By performing tasks such as log parsing and feature …

LogFold: Enhancing Log Anomaly Detection Through Sequence Folding and Reconstruction

X Shi, R Li, Q Du, C He, F Tian - 2023 30th Asia-Pacific …, 2023 - ieeexplore.ieee.org
Modern large-scale systems and networks necessitate automated anomaly detection to
support the high availability and quality of services. Since logs are an essential data source …

LogGC: Novel Approach for Graph-based Log Anomaly Detection

S Andonov, G Madjarov - 2023 IEEE International Conference …, 2023 - ieeexplore.ieee.org
The system logs record the state and behavior of the systems at a given moment and
represent an essential resource for understanding system issues and their remediation. Log …

Hybrid big data architecture for high-speed log anomaly detection

P Tangsatjatham, N Nupairoj - 2016 13th International joint …, 2016 - ieeexplore.ieee.org
Log processing can be very challenging, especially for environments with lots of servers. In
these environments, log data is large, coming at high-speed, and have various formats, the …

AllInfoLog: Robust Diverse Anomalies Detection Based on All Log Features

R Xiao, H Chen, J Lu, W Li, S Jin - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Large-scale services are generating massive logs, which trace the runtime states and critical
events. Anomaly detection via logs is critical for service maintenance and reliability …